Proceedings of the 2019 9th International Conference on Communication and Network Security最新文献

筛选
英文 中文
Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States 利用三量子位纠缠态制备任意实参数多量子位态的确定性控制远程状态
Kaihang Zhou, Lei Shi, Jiahua Wei, Yang Xue, Jie Tang
{"title":"Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States","authors":"Kaihang Zhou, Lei Shi, Jiahua Wei, Yang Xue, Jie Tang","doi":"10.1145/3371676.3371688","DOIUrl":"https://doi.org/10.1145/3371676.3371688","url":null,"abstract":"This paper offers a theoretical protocol for deterministic controlled remote state preparation of arbitrary real-parameter multi-qubit states, in which the maximally three-qubit entangled states are used as quantum channel. We elaborate the processes of implementing remote state preparation of the real-parameter two- and three-qubit states, and extend the protocol to realize the real-parameter n-qubit states. By performing the appropriate multi-qubit projective measurement basis and multi-qubit unitary operations, the successful probability of our scheme can reach 100%.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Abnormal Network Traffic Detection based on Leaf Node Density Ratio 基于叶节点密度比的网络异常流量检测
Huajun Liu, Zhanghui Liu, Yanhua Liu, Xiaoling Gao
{"title":"Abnormal Network Traffic Detection based on Leaf Node Density Ratio","authors":"Huajun Liu, Zhanghui Liu, Yanhua Liu, Xiaoling Gao","doi":"10.1145/3371676.3371678","DOIUrl":"https://doi.org/10.1145/3371676.3371678","url":null,"abstract":"As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data in time. In the existing abnormal network traffic detection method based on Extended Isolation Forest, there are limitations such as unbalanced detection accuracy and insufficient generalization ability. An improved abnormal network traffic detection method EIF-LNDR is proposed for the above problems. Based on the leaf node density ratio, the anomaly score of the instance can be calculated differently for each iTree. The experiments show that EIF-LNDR has significant improvement in precision, false negative rate, and detector efficiency compared with Extended Isolation Forest and LOF methods.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129900718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-source Landmark Fusion based on Machine Learning 基于机器学习的多源地标融合
Wen Yang, Meijuan Yin, Xiaonan Liu, Can Wang, Shunran Duan
{"title":"Multi-source Landmark Fusion based on Machine Learning","authors":"Wen Yang, Meijuan Yin, Xiaonan Liu, Can Wang, Shunran Duan","doi":"10.1145/3371676.3371694","DOIUrl":"https://doi.org/10.1145/3371676.3371694","url":null,"abstract":"Network entity landmark is the key foundation of IP geolocaiton which plays an important role in network security. Integrating multi-source landmarks to generate a landmark database with high IP coverage and high location accuracy is an important solution for improving the IP geolocation effect. However, the city-level landmarks provide the city name while street-level landmarks provide the latitude and longitude where they located. Owning to their inconsistent format, the state-of-art fusion algorithm cannot effectively integrate the two types of data. Hence, this paper proposes Lusion, a multi-source landmark fusion algorithm. We first extend the IP addresses in the landmark data sources, then model the location data of the two types of landmarks using the landmark location mixture model, and finally use the expectation -maximization algorithm to estimate the location of the landmarks. The simulation experiments on 25 landmark data sources show that the algorithm can effectively integrate the city-level and street-level landmarks from different data sources, and have a significantly better performance than the original data sources in the location accuracy. Furthermore, we evaluate Lusion on real-world datasets, which consists of 7 city-level and 3 street-level landmark data sources, by locating 100 IP addresses in Hong Kong and Zhengzhou respectively. The geolocation results show that Lusion increased the city-level accuracy by at least 8 percentage points compared with the original data sources, and reduces the geolocation error from 3.42 km to 2.92 km based on the best original landmark data set.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131128492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series 基于时间序列的工业互联网安全态势组合预测方法
Yingying Qi, W. Shang, Xiaojun He
{"title":"A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series","authors":"Yingying Qi, W. Shang, Xiaojun He","doi":"10.1145/3371676.3371704","DOIUrl":"https://doi.org/10.1145/3371676.3371704","url":null,"abstract":"Attacks on industrial control systems have different types and various intensities. Predicting the development trend of security state for updating defense strategy in time is important. Every single prediction model has its different emphases, and the accuracy of single prediction model may be reduced when the system is attacked. Combined prediction model integrates the prediction results of multiple single prediction models to improve the overall prediction accuracy. The weight of the combined model is determined by the mean square error of every single model. It is taken a logarithmic function of the mean square error of each single model to enlarge the difference between the superior and inferior models. Then, the simple weight function is taken to determine the weight of each model based on the logarithm result of each model.This approach makes greater use of accurate model information. Through the comparative analysis of the model, the error of the combined prediction method is obviously reduced. Through the comparison and analysis of the weighted method, the error of the weighted method of the combined prediction model proposed in this paper is the minimum. The combined prediction method can provide more accurate defense opinions for network security administrators.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"1994 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131263668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Scrambling Scheme for Physical Layer Security 一种有效的物理层安全置乱方案
Enjian Bai, F. Qin, Sijing Chen
{"title":"Effective Scrambling Scheme for Physical Layer Security","authors":"Enjian Bai, F. Qin, Sijing Chen","doi":"10.1145/3371676.3371689","DOIUrl":"https://doi.org/10.1145/3371676.3371689","url":null,"abstract":"Scrambling is a practical scheme in the physical layer to increase the information security of wireless communication systems. However, the complexity of the conventional scrambling scheme O(n2)affects its practical application for long information size, where n is the information size. In this paper, we propose an effective scrambling scheme for the additive white Gaussian noise (AWGN) wiretap channel and investigate how the complexity and security gap can be reduced by our scheme. We compare our proposed scrambling scheme with the conventional random scrambling scheme and the results show that our scheme achieves a smaller security gap. Moreover, we demonstrate that by introducing proposed scrambling scheme can achieve lower complexity compared with the random scrambling scheme.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123448136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Privacy Protection Scheme Based on Location Services 基于位置服务的位置隐私保护方案
Chen Yang, Wei Yan
{"title":"Location Privacy Protection Scheme Based on Location Services","authors":"Chen Yang, Wei Yan","doi":"10.1145/3371676.3371695","DOIUrl":"https://doi.org/10.1145/3371676.3371695","url":null,"abstract":"Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed, which includes location hiding algorithm and query privacy protection algorithm. Q-Tree storage ensures that anonymous location units are as dispersed as possible. The point of interest (POI) with higher query probability is selected as the query content of anonymous location unit, which protects the user's query privacy. At the same time, private information retrieval technology (PIR) is used to provide users with higher privacy and security protection. Finally, the effectiveness of the scheme is proved by privacy analysis and experimental results.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Note on Polynomial-time Solvability for Edge Packing on Graphs 图上边填充的多项式时间可解性注记
Jiaxin Liu, Xuerong Yue, Zhibin Chen
{"title":"A Note on Polynomial-time Solvability for Edge Packing on Graphs","authors":"Jiaxin Liu, Xuerong Yue, Zhibin Chen","doi":"10.1145/3371676.3371691","DOIUrl":"https://doi.org/10.1145/3371676.3371691","url":null,"abstract":"In this paper, we consider a generalized matching problem, the so-called edge packing problem. Given a graph G such that each vertex v is associated with a positive integer w(v), an edge packing F with respect to these integers (abbreviated as edge packing) is a collection of edges (repetition is allowed) of G such that each vertex (counting multiplicities) v belongs to at most w(v) members of F. When all vertices are associated with 1's in G, then edge packings are the usual matchings. The maximum edge packing problem asks for an edge packing containing edges as many as possible. We design an algorithm that solves this problem in polynomial-time, showing that this problem is polynomial-time solvable. Furthermore, our algorithm relies heavily on algorithms that solve b-matching in strongly polynomial time, showing that any strongly polynomial-time algorithm for b-matching provides a strongly polynomial-time algorithm for the maximum edge packing problem.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127935369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop 基于DV-Hop的无线传感器网络定位算法改进研究
Q. He, Cong Dai, Rong Si, Jianwen Lin
{"title":"Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop","authors":"Q. He, Cong Dai, Rong Si, Jianwen Lin","doi":"10.1145/3371676.3371698","DOIUrl":"https://doi.org/10.1145/3371676.3371698","url":null,"abstract":"Aiming at the problem that the traditional DV-Hop localization algorithm has low positioning accuracy, an improved DV-Hop algorithm is proposed. The minimum mean square error is used to calculate the average hop distance of the anchor node, and the average hop distance from the unknown node to the anchor node is corrected by a dynamic weight associated with the minimum hop count. The coordinates of the unknown nodes are estimated by the two-dimensional hyperbolic method, and the estimated coordinates are updated by the parameter factors. And using MATLAB to simulate the improved algorithm. The simulation results show that compared with the traditional DV-Hop positioning algorithm, the improved algorithm positioning error is reduced by 21.8%, which makes the positioning accuracy greatly improved and does not need to add additional hardware overhead.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL 基于改进DEMATEL的船舶核动力系统DCS深度安全性分析
Yu Kun
{"title":"Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL","authors":"Yu Kun","doi":"10.1145/3371676.3371677","DOIUrl":"https://doi.org/10.1145/3371676.3371677","url":null,"abstract":"The deep security of DCS(Distributed Control System) is more serious than conventional hardware problems for ship's nuclear power system. It is great significance to study the DCS deep security for operation security of ship's nuclear power system. The main characteristics of DCS deep security are obtained by comparing and analyzing the ship's nuclear power with the conventional control and information system. The DCS deep security protection system is constructed, and an improved DEMIAL method is used to analyze center degree and cause degree of the system elements. The improved scale model is proposed to construct direct relationship matrix based on Weber-Fechner law. Weights are used to synthesize multiple decision-making opinions. The main concerns of deep security protection and the system elements with large influence are analyzed. The results of the DCS deep security factors model, the protection system and the protection system elements of ship's nuclear power system, can provide valuable support for the follow-up research on the deep security technology and system of ship's nuclear power system.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics 基于机器学习和行为特征的异常加密流量检测方法
Bin Kong, Zhangpu Liu, Guangmin Zhou, Xiaoyan Yu
{"title":"A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics","authors":"Bin Kong, Zhangpu Liu, Guangmin Zhou, Xiaoyan Yu","doi":"10.1145/3371676.3371705","DOIUrl":"https://doi.org/10.1145/3371676.3371705","url":null,"abstract":"Classification of network traffic using port-based or deep packet-based analysis is becoming increasingly difficult with many peer-to-peer(P2P) applications using dynamic port numbers, especially in massive data streams. In view of the problem that traditional method cannot be self-learning and self-evolving in dynamic networks, this paper proposed an abnormally encrypted traffic detection method based on machine learning and behavior characteristics, this approach can not only identify unknown abnormal traffic, but eliminate specific feature extraction in advance, which can effectively improve the accuracy of the abnormal encrypted traffic detection system. In this paper, we processed the network traffic data with using a machine learning approach combined behavior characteristics of applications, the experimental results show that in the complex network, the abnormal encrypted data stream detection method based on machine learning and behavior characteristics has higher recognition accuracy and can more effectively solve the problem of abnormally encrypted traffic identification.","PeriodicalId":352443,"journal":{"name":"Proceedings of the 2019 9th International Conference on Communication and Network Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131416993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信